The presentation discusses the vulnerabilities in UEFI firmware and the current state of mitigation and hardening technologies.
- UEFI firmware is portable and runs on many platforms, making it interesting and dangerous for attackers
- CVE-2021-2016 is an example of a vulnerability found in UEFI firmware
- Mitigation and hardening technologies are not mandatory and not enabled by default
- There is a lack of various memory protection enforcement in UEFI firmware
- Some mitigation technologies are not compatible with each other
- The pre-efficient phase known as PAY does not support any kind of mitigation based on the guard paging
- HIP guard feature could increase memory consumption and cause memory out of resources
The presentation highlights the vulnerability in UEFI firmware where an attacker can exploit the firmware performance table pointer, which is fully controllable by the attacker, and overwrite any portion of the memory. The exploit is not detected by any TPMs, making it very attractive to attackers. The current state of mitigation and hardening technologies is not great, as they are not mandatory and not enabled by default. Additionally, some mitigation technologies are not compatible with each other, and the pre-efficient phase known as PAY does not support any kind of mitigation based on the guard paging. HIP guard feature could increase memory consumption and cause memory out of resources.